Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 10:34
Behavioral task
behavioral1
Sample
5b7a6743d414205cf4f6972bdba2aa594f975b5779e0a3070b50ef7553cd3567N.exe
Resource
win7-20240903-en
General
-
Target
5b7a6743d414205cf4f6972bdba2aa594f975b5779e0a3070b50ef7553cd3567N.exe
-
Size
236KB
-
MD5
33b77a0a127c49adc41ad49fdbb7fe90
-
SHA1
df803a4daef7efabe83f2995683eee443ce09081
-
SHA256
5b7a6743d414205cf4f6972bdba2aa594f975b5779e0a3070b50ef7553cd3567
-
SHA512
6dff61035835f70976716df66db26f9903288d4a2889c8d33d82943c4e5e9d4724f2c6304e492c24785a9cb75dffd4db7258773739a7a0403d58ccd2ff021764
-
SSDEEP
3072:OJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/aH/FnncroP9:SwDeM7iNEkgiOb31k1ECyfJ/F
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2180-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2180-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0008000000012118-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b7a6743d414205cf4f6972bdba2aa594f975b5779e0a3070b50ef7553cd3567N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD555ece7a173f5ba274645db70b64da2f3
SHA178f7aed3fc2587a3b8999324c5cdac64045b48fb
SHA256ba5483a402cdb19e5f552879c233999960031cba8a9bd02f72606d1b685d5b05
SHA512059e4e9a8cb6591bdc9072f7e44affed599fd4c6a01e814e9620e3a9deaffe5ebcff6afd98ca9bac89457953ceac177a9c2d9a8904bc576807a68bbf7c1f4412